Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
In this paper, we propose a novel identity authentication scheme for power IoT. The scheme combines the physical unclonable function (PUF) with improved CPK ...
The proposed scheme is based on CPK and SRAM PUF. It adopts a two-factor authentication method. When the CPK signature is successfully verified and the solved ...
unlimited public keys. The current implementation method is mainly based on the elliptic curve [10]. ... and fast. Thus, CPK can meet the large-scale ...
People also ask
Download scientific diagram | Comparison of the characteristics of identity authentication schemes for IoT devices from publication: A CPK-Based Identity ...
Research of Ubiquitous Power Internet of Things Security Authentication Method Based on CPK and RIFD ... A CPK-Based Identity Authentication Scheme for IoT.
This paper propose a Combined Public Key (CPK) and zero-trust based architecture to protect mobile IoT from identity forgery attacks. Specifically, we adopt an ...
Missing: Scheme | Show results with:Scheme
Feb 10, 2019 · In this paper, we propose a novel and lightweight anony- mous authentication and key agreement scheme for hetero- geneous IoT, which is based on ...
The proposed HyCPK, an improved CPK algorithm based on a single-double hybrid matrix, can solve the problem of large-scale certification and resist three ...
A CPK credibility authentication system using chip, the chip includes the dedicated COS, CPK arithmetic, ID certificate, signature protocol and key exchange ...
A CPK-Based Identity Authentication Scheme for IoT. Zhang, MM; Mao, JM; Ma, YN; Xu, LJ; Wang, CJ; Zhao, R; Li, ZH; Chen, L; Zhao, WB.